Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-3528

Опубликовано: 03 июл. 2007
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5

Описание

The blowfish mode in DAR before 2.3.4 uses weak Blowfish-CBC cryptography by (1) discarding random bits by the blowfish::make_ivec function in libdar/crypto.cpp that results in predictable and repeating IV values, and (2) direct use of a password for keying, which makes it easier for context-dependent attackers to decrypt files.

РелизСтатусПримечание
dapper

ignored

end of life
devel

released

2.3.5-1
edgy

ignored

end of life, was needed
feisty

ignored

end of life, was needed
gutsy

released

2.3.5-1
hardy

released

2.3.5-1
intrepid

released

2.3.5-1
jaunty

released

2.3.5-1
karmic

released

2.3.5-1
upstream

needs-triage

Показывать по

Ссылки на источники

EPSS

Процентиль: 66%
0.00514
Низкий

5 Medium

CVSS2

Связанные уязвимости

nvd
больше 18 лет назад

The blowfish mode in DAR before 2.3.4 uses weak Blowfish-CBC cryptography by (1) discarding random bits by the blowfish::make_ivec function in libdar/crypto.cpp that results in predictable and repeating IV values, and (2) direct use of a password for keying, which makes it easier for context-dependent attackers to decrypt files.

debian
больше 18 лет назад

The blowfish mode in DAR before 2.3.4 uses weak Blowfish-CBC cryptogra ...

github
больше 3 лет назад

The blowfish mode in DAR before 2.3.4 uses weak Blowfish-CBC cryptography by (1) discarding random bits by the blowfish::make_ivec function in libdar/crypto.cpp that results in predictable and repeating IV values, and (2) direct use of a password for keying, which makes it easier for context-dependent attackers to decrypt files.

EPSS

Процентиль: 66%
0.00514
Низкий

5 Medium

CVSS2